Variant One -- Bounds Check Bypass:
Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.Variant Two -- Branch Target Injection:
Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.Variant Three -- Rogue Data Cache Load
Zero AMD vulnerability due to AMD architecture differences.
I'm not sure what to make of the "near zero risk" for Variant Two.